Abstract

Static security assessment (SSA) is an important procedure to ensure the static security of the power system. Researches recently show that cyber-attacks might be a critical hazard to the secure and economic operations of the power system. In this paper, the influences of false data injection attack (FDIA) on the power system SSA are studied. FDIA is a major kind of cyber-attacks that can inject malicious data into meters, cause false state estimation results, and evade being detected by bad data detection. It is firstly shown that the SSA results could be manipulated by launching a successful FDIA, which can lead to incorrect or unnecessary corrective actions. Then, two kinds of targeted scenarios are proposed, i.e., fake secure signal attack and fake insecure signal attack. The former attack will deceive the system operator to believe that the system operates in a secure condition when it is actually not. The latter attack will deceive the system operator to make corrective actions, such as generator rescheduling, load shedding, etc. when it is unnecessary and costly. The implementation of the proposed analysis is validated with the IEEE-39 benchmark system.

Highlights

  • IntroductionImpact analysis of false data injection attacks on power system static security assessment violated when be subject to a disturbance [4,5,6,7]

  • Ensuring the operation security of a power system has always been a basic yet important requirement

  • We focus on the static security assessment (SSA) which highly depends on the state estimation results

Read more

Summary

Introduction

Impact analysis of false data injection attacks on power system static security assessment violated when be subject to a disturbance [4,5,6,7]. We intend to perform security and economy analysis of the SSA based on nonlinear power system model under FDIAs with transmission line real power flow overload/non-overload situations. The major contributions of this paper are two-folds: 1) Analyze the influences of FDIAs on the SSA and show that the secure and insecure SSA results can be manipulated by the attacker; 2) Propose two targeted attack scenarios: fake secure signal attack and fake insecure signal attack The former one is to convert the insecure situations into secure circumstances, in such a way that the control center is cheated to not do the necessary actions; the latter one is to convert the secure situations into insecure circumstances, in such a way that the control center is cheated to operate unnecessary actions.

Assumptions and preliminaries
State estimation and bad data detection
False data injection attack
Fake secure signal attack
SSA under FDIAs
False insecure signal attack
Solution method
Simulation results
False secure signal attacks
False insecure signal attacks
The orignal measurement data
The orignal measurement data The injected malicious data
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call